Author:Dawood, Zubeida C; Keet, CMDate:Sep 2017Modularity has been proposed as a solution to deal with large ontologies. This requires, various module management tasks, such as swapping an outdated module for a new one or a computationally costly one for a leaner fragment. No mechanism ...Read more
Author:Coetzer, W; Moodley, D; Gerber, ADate:May 2013The domain complexity and structural- and semantic heterogeneity of biodiversity data, as well as idiosyncratic legacy data-creation processes, present significant integration and interoperability challenges. In this paper we describe a ...Read more
Author:Van Heerden, Renier P; Irwin, B; Burke, Ivan DDate:Mar 2012This paper presents eight of the most significant computer hacking events (also known as computer attacks). These events were selected because of their unique impact, methodology, or other properties. A temporal computer attack model is ...Read more
Author:Leenen, L; Alberts, R; Britz, K; Gerber, A; Meyer, TDate:Mar 2011In this paper we describe a research project to develop an optimal information retrieval system in an Information Operations domain. Information Operations is the application and management of information to gain an advantage over an opponent ...Read more
Author:Van Heerden, Renier P; Pieterse, Heloise; Irwin, BDate:Sep 2012This paper presents 8 of the most significant computer hacking events (also known as computer attacks). These events were selected because of their unique impact, methodology, or other properties. A temporal computer attack model is presented ...Read more
Author:Dawood, Zubeida C; Van 't Wout, CDate:Oct 2022Although there is an increasing amount of information for counter-terrorism operations freely available online, it is a complex process to extract relevant information and to detect useful patterns in the data in order for intelligence ...Read more
Author:Lombard, NDate:Oct 2010Military aircraft in the battlefield are under constant threat from missile attacks. Technology such as infra-red countermeasures are used to protect against these threats. Measurements, modelling and simulation are used by the military to ...Read more
Author:Mouton, F; Leenen, L; Malan, MM; Venter, HSDate:Aug 2014The human is often the weak link in the attainment of Information Security due to their susceptibility to deception and manipulation. Social Engineering refers to the exploitation of humans in order to gain unauthorised access to sensitive ...Read more
Author:Kaczmarek, I; Lukowicz, J; Cooper, Antony K; Iwaniak, A; Kubik, T; Paluszynski, WDate:Jul 2011Spatial planning in Poland, as in other European countries, is done at three basic levels: national, regional and local. At the local level, the local spatial development plan is prepared, which is the principal instrument for forming the ...Read more